National Institute of Standards and Technology
Package illustrating a test case

Test case 155055

Description

This test takes in a char value from a taint source. The value is cast to a byte causing an unsigned to signed conversion. This value is then used to allocate an array. If the original char is >127 this will lead to a negative index for the array causing a NegativeArraySizeException.
Metadata
- Base program: Apache Jena
- Source Taint: FILE_CONTENTS
- Data Type: VOID_POINTER
- Data Flow: VAR_ARG_LIST
- Control Flow: INTERRUPT

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.